General

  • Target

    Mod menu.exe

  • Size

    225KB

  • Sample

    220910-p4l89sabc3

  • MD5

    e8685789e1d355b022632c6b9e8c27c7

  • SHA1

    feb1c07bcba00a9184d58e92622e105671fb06a5

  • SHA256

    19c3401042baeac38e94c3105dbfc1249697741f242db3f51f52eebb45c92ad9

  • SHA512

    a5fea415f09765175d93ec6851cc2bfd41f75003bcd4ef4d5863233ca4e70ab6f2937e32c60408d836d2ea4dc0e6e9ad09d2948cc497e942004f780fa2760e45

  • SSDEEP

    6144:FhQSSuvV2HmLa3a7guuLwjaHPm4PUdOX:FhQU4mLyGo+rOX

Malware Config

Extracted

Family

redline

Botnet

@wyuiiii

C2

185.106.92.226:40788

Attributes
  • auth_value

    e616906b36ab81b0f11bcc9eadad8236

Targets

    • Target

      Mod menu.exe

    • Size

      225KB

    • MD5

      e8685789e1d355b022632c6b9e8c27c7

    • SHA1

      feb1c07bcba00a9184d58e92622e105671fb06a5

    • SHA256

      19c3401042baeac38e94c3105dbfc1249697741f242db3f51f52eebb45c92ad9

    • SHA512

      a5fea415f09765175d93ec6851cc2bfd41f75003bcd4ef4d5863233ca4e70ab6f2937e32c60408d836d2ea4dc0e6e9ad09d2948cc497e942004f780fa2760e45

    • SSDEEP

      6144:FhQSSuvV2HmLa3a7guuLwjaHPm4PUdOX:FhQU4mLyGo+rOX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks